In fond memory of our founder Harold "Harry" J. Swart, Jr. January 18, 1946 - March 9, 2025
Remembering Harry SwartBreaking down the jargon: Your cybersecurity dictionary
Think cybersecurity is just for tech experts? Think again. Today's cybercriminals target businesses of all sizes—and they're counting on you not understanding their tactics. This guide breaks down the terms you need to know to protect your business.
Email scams
Phishing: Fake emails pretending to be from banks or vendors to steal your passwords. Watch for urgent requests and suspicious links.
Spear phishing: Targeted attacks using specific information about your business. Example: "Hi Sarah, here's the invoice from the Denver trade show" (when you already paid weeks ago).
Vishing: Phone scams where callers pose as IT support or government officials demanding immediate action.
Smishing: Text message scams, often about package deliveries. Example: "FedEx: Update payment info here [suspicious link]"
Data threats
Ransomware: Malicious software that locks your files until you pay. Your customer records suddenly become encrypted with demands for $50,000 in cryptocurrency.
Double extortion: Ransomware that both encrypts AND steals your data, threatening to publish client information online if you don't pay.
Human manipulation
Social engineering: Tricking people into breaking security rules through psychology rather than hacking. Example: "I'm the new employee and locked myself out—can you help?"
Business Email Compromise (BEC): Hackers impersonating your CEO or vendors. Watch for sudden payment changes or urgent wire transfer requests from "the boss."
Pretexting: Creating fake scenarios to steal information. Example: "I'm from your internet provider and need to verify your password."
Advanced threats
Zero-day exploits: Attacks using security holes that even software makers don't know exist—like thieves finding a hidden door the architect didn't know about.
IoT vulnerabilities: Security weaknesses in smart devices like cameras and printers that hackers exploit to access your network.
Your defense tools
Multifactor authentication (MFA): Requiring a password plus a secondary identity verification method (like a phone code). Even if hackers steal your password, they can't access your accounts without your phone.
Endpoint protection: Software monitoring all devices on your network for suspicious activity—like security cameras for your computers.
Network segmentation: Dividing your network into sections so problems can't spread—think fire doors in a building.
Offline backups: Data copies stored completely disconnected from your network. Ransomware can't encrypt what it can't reach.
Red flags to watch for
Urgent demands for money or information
Requests bypassing normal procedures
Generic greetings ("Dear customer")
Sudden payment method changes
Threats of account closure
Unexpected attachments or links
If something seems suspicious, it probably is
Understanding these terms isn't about becoming a tech expert—it's about recognizing threats before they cost you thousands. When something seems suspicious, it probably is. Verify through a different communication channel. Your business's security depends on it.
Back to issue